At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Determining depth data for a captured image
A method, system, and one or more computer-readable storage media for depth acquisition from density modulated binary patterns are provided herein. The method...
Optimized telepresence using mobile device gestures
Telepresence of a mobile user (MU) utilizing a mobile device (MD) and remote users who are participating in a telepresence session is optimized. The MD receives...
Techniques for a mixed audio conference
Techniques for a mixed audio conference are described. An apparatus may comprise an audio video multipoint control unit to mix call information from multiple...
Controlling display of video data
A user terminal comprising: a network interface; a display; and a communications module configured to: receive video data from at least one further user...
Adjustable mobile phone settings based on environmental conditions
A mobile communication device automatically adapts to different environments based on the ambient audio it detects. Device message indicators (e.g., ringers,...
Contextual auto-replication in short range wireless networks
Previously cached data that includes contextual information is transferred between wireless devices. A first wireless device that is highly mobile is arranged...
Application-driven CDN pre-caching
Techniques are provided for the caching of content prior to the content being requested. A request for desired content may be received from a client application...
Managed P2P network with content-delivery network
A content-acquisition request is sent to a centralized management service computer via a computer network. The content-acquisition request may query the...
Social media impact assessment
A system for identifying influential users of a social network platform. The system may compute a score for each of multiple users. Such a score may be...
Efficient data access on a shared data network
One or more techniques and/or systems are disclosed for providing efficient synchronized data access. A request to access data on a first data provider is...
Fast join of peer to peer group with power saving mode
A wireless peer-to-peer protocol that supports fast and low power joining to an existing group. The protocol may be an extension of a peer-to-peer protocol that...
Cooperative federation of digital devices via proxemics and device
The subject disclosure is directed towards co-located collaboration/data sharing that is based upon detecting the proxemics of people and/or the proxemics of...
Managing multiple dynamic media streams
A coordinated adaptive streaming system provides a level of intelligence between adaptive streaming heuristics applied to multiple multi-bitrate streams playing...
Federated realm discovery
A federated realm discovery system within a federation determines a "home" realm associated with a portion of the user's credentials before the user's secret...
Actively federated mobile authentication
To make a trusted web service call, a client application sends a series of messages to obtain tokens that allow service requests to pass through a service...
Multimodal conversation transfer
In one embodiment, a user may transfer a multimodal conversation. A multimodal conversation may have a first mode communication session and a second mode...
Wake pattern management
Wake pattern management techniques are described. In one or more implementations, network traffic received by a network interface device of a computing device...
Synchronization of conversation data
Systems and methods for synchronizing conversation data between a client and a server in a networked computing environment. A data structure associated with an...
Utilization of a protected module to prevent offline dictionary attacks
Various technologies pertaining to authenticating a password in a manner that prevents offline dictionary attacks are described. A protected module, which can...
Speech recognition assisted evaluation on text-to-speech pronunciation
Pronunciation issues for synthesized speech are automatically detected using human recordings as a reference within a Speech Recognition Assisted Evaluation...
Adjusting user interfaces based on entity location
The present invention extends to methods, systems, and computer program products for adjusting user interfaces based on entity location. Embodiments of the...
Automatic variable virtual focus for augmented reality displays
The technology provides an augmented reality display system for displaying a virtual object to be in focus when viewed by a user. In one embodiment, the focal...
Automated video looping with progressive dynamism
Various technologies described herein pertain to generating a video loop. An input video can be received, where the input video includes values at pixels over a...
Recommending actions based on context
A system creates filters and provides tasks based on a geographic location associated with each task. The geographic location may be in one of several types of...
Computer-implemented deep tensor neural network
A deep tensor neural network (DTNN) is described herein, wherein the DTNN is suitable for employment in a computer-implemented recognition/classification...
Decision tree computation in hardware utilizing a physically distinct
integrated circuit with on-chip memory...
A computing device for use in decision tree computation is provided. The computing device may include a software program executed by a processor using portions...
Mapping glints to light sources
The technology disclosed herein provides various embodiments for mapping glints that reflect off from an object to light sources responsible for the glints....
Secure serial number
A serial number for a software product is secured with an authenticator value. The authenticator value and the serial number are evaluated entirely by a remote...
Using social-network data for identification and ranking of URLs
Methods, systems, and computer-readable media are provided for updating a search index with new uniform resource locators (URLs) and with metadata for new and...
Interactive search results page
Described herein are various technologies pertaining to presenting search results to a user, wherein the search results are messages generated by way of social...
Message classification and management
Message management and classification techniques are described. In one or more implementations, a message received from a sender for delivery via a user account...
Mobile friendly internet searches
Mobile friendly internet searches are enabled by determining if individual internet sites are mobile friendly. In a described implementation, a...
System and method for synchronizing a repository with a declarative
The subject disclosure relates to a method and system for synchronizing a repository with a declarative definition. The method and system includes receiving the...
Cross-pollination synchronization of data
A technique and mechanism to effect cross-pollination synchronization of PIM (personal information manager) data to multiple sources. Additionally, a novel...
User behavior model for contextual personalized recommendation
A user behavior model provides personalized recommendations based in part on time and location, particularly to users of mobile devices. Entity types are ranked...
Relevancy sorting of user's browser history
Various embodiments provide a Web browser that employs a relevancy algorithm to make an educated guess as to the likelihood of a user's intended destination...
Described are embodiments for allowing clients that access a distributed file system to locally cache directory metadata. The client may request a read lease...
Scaling statistical language understanding systems across domains and
A scalable statistical language understanding (SLU) system uses a fixed number of understanding models that scale across domains and intents (i.e. single vs....
Data caching policy in multiple tenant enterprise resource planning system
A cache manager application provides a data caching policy in a multiple tenant enterprise resource planning (ERP) system. The cache manager application manages...
Module specific tracing in a shared module environment
A module-specific tracing mechanism may trace the usage of a module on behalf of the module developer. The module may be used by multiple application...
Efficient migration of client-side web state
A state migration module (SMM) is described herein which seamlessly, efficiently, and correctly transfers application state between user computing devices, or...
Cross-platform application programming interfaces for applications
Concepts and technologies are described herein for cross-platform application programming interfaces for applications. In accordance with the concepts and...
Remotely retrieving information from consumer devices
Users that access their personal information from a home computer typically only need access to data, and do not need to remotely control the desktops of their...
Self-adjusting framework for managing device capacity
Automatically improving a deployment. A method includes, in a live distributed computing environment, adjusting operating parameters of deployment components....
Status tool to expose metadata read and write queues
A method to expose status information is provided. The status information is associated with metadata extracted from multimedia files and stored in a metadata...
Schedule based execution with extensible continuation based actions
Generally in a computing environment, executing work based on time (i.e. according to a predetermined schedule) is a common need. However, in cloud based...
Virtual switch interceptor
Application management is facilitated by observing messages communicated amongst virtual applications external to application-hosting virtual machines. In one...
Virtual machine packing method using scarcity
A method for packing virtual machines onto host devices may calculate scarcity values for several different parameters. A host's scarcity for a parameter may be...
Language integration via function redirection
Systems and methods for language integration via function redirection are disclosed herein in connection with simulation of quantum computations on classical...
Supporting dynamic behavior in statically compiled programs
Support for dynamic behavior is provided during static compilation while reducing reliance on JIT compilation and large runtimes. A mapping is created between...